Bump the bundler group across 1 directory with 7 updates
Bumps the bundler group with 3 updates in the /def directory: nokogiri, globalid and request_store.
Updates nokogiri from 1.8.1 to 1.18.9
Release notes
Sourced from nokogiri's releases.
v1.18.9 / 2025-07-20
Security
- [CRuby] Applied upstream libxml2 patches to address CVE-2025-6021, CVE-2025-6170, CVE-2025-49794, CVE-2025-49795, and CVE-2025-49796. See GHSA-353f-x4gh-cqq8 for more information.
5bcfdf7aa8d1056a7ad5e52e1adffc64ef53d12d0724fbc6f458a3af1a4b9e32 nokogiri-1.18.9-aarch64-linux-gnu.gem 55e9e6ca46c4ad1715e313f407d8481d15be1e3b65d9f8e52ba1c124d01676a7 nokogiri-1.18.9-aarch64-linux-musl.gem eea3f1f06463ff6309d3ff5b88033c4948d0da1ab3cc0a3a24f63c4d4a763979 nokogiri-1.18.9-arm64-darwin.gem fe611ae65880e445a9c0f650d52327db239f3488626df4173c05beafd161d46e nokogiri-1.18.9-arm-linux-gnu.gem 935605e14c0ba17da18d203922440bf6c0676c602659278d855d4622d756a324 nokogiri-1.18.9-arm-linux-musl.gem ac5a7d93fd0e3cef388800b037407890882413feccca79eb0272a2715a82fa33 nokogiri-1.18.9.gem 1fe5b7aa4a054eda689a969bb4e03999960a6ea806582d327207d687168bceb5 nokogiri-1.18.9-java.gem 6b4fc1523aa0370c78653e38c94cb50e7f3ab786425de66ba7ad24222c1164a3 nokogiri-1.18.9-x64-mingw-ucrt.gem e0d2deb03d3d7af8016e8c9df5ff4a7d692159cefb135cbb6a4109f265652348 nokogiri-1.18.9-x86_64-darwin.gem b52f5defedc53d14f71eeaaf990da66b077e1918a2e13088b6a96d0230f44360 nokogiri-1.18.9-x86_64-linux-gnu.gem e69359d6240c17e64cc9f43970d54f13bfc7b8cc516b819228f687e953425e69 nokogiri-1.18.9-x86_64-linux-musl.gemv1.18.8 / 2025-04-21
Security
- [CRuby] Vendored libxml2 is updated to v2.13.8 to address CVE-2025-32414 and CVE-2025-32415. See GHSA-5w6v-399v-w3cc for more information.
36badd2eb281fca6214a5188e24a34399b15d89730639a068d12931e2adc210e nokogiri-1.18.8-aarch64-linux-gnu.gem 664e0f9a77a7122a66d6c03abba7641ca610769a4728db55ee1706a0838b78a2 nokogiri-1.18.8-aarch64-linux-musl.gem 483b5b9fb33653f6f05cbe00d09ea315f268f0e707cfc809aa39b62993008212 nokogiri-1.18.8-arm64-darwin.gem 17de01ca3adf9f8e187883ed73c672344d3dbb3c260f88ffa1008e8dc255a28e nokogiri-1.18.8-arm-linux-gnu.gem 6e6d7e71fc39572bd613a82d528cf54392c3de1ba5ce974f05c832b8187a040b nokogiri-1.18.8-arm-linux-musl.gem 8c7464875d9ca7f71080c24c0db7bcaa3940e8be3c6fc4bcebccf8b9a0016365 nokogiri-1.18.8.gem 41002596960ff854198a20aaeb34cff0d445406d5ad85ba7ca9c3fd0c8f03de0 nokogiri-1.18.8-java.gem 11ab0f76772c5f2d718fb253fca5b74c6ef7628b72bbf8deba6ab1ffc93344cf nokogiri-1.18.8-x64-mingw-ucrt.gem 024cdfe7d9ae3466bba6c06f348fb2a8395d9426b66a3c82f1961b907945cc0c nokogiri-1.18.8-x86_64-darwin.gem 4a747875db873d18a2985ee2c320a6070c4a414ad629da625fbc58d1a20e5ecc nokogiri-1.18.8-x86_64-linux-gnu.gem ddd735fba49475a395b9ea793bb6474e3a3125b89960339604d08a5397de1165 nokogiri-1.18.8-x86_64-linux-musl.gemv1.18.7 / 2025-03-31
Dependencies
... (truncated)
Changelog
Sourced from nokogiri's changelog.
v1.18.9 / 2025-07-20
Security
- [CRuby] Applied upstream libxml2 patches to address CVE-2025-6021, CVE-2025-6170, CVE-2025-49794, CVE-2025-49795, and CVE-2025-49796. See GHSA-353f-x4gh-cqq8 for more information.
v1.18.8 / 2025-04-21
Security
- [CRuby] Vendored libxml2 is updated to v2.13.8 to address CVE-2025-32414 and CVE-2025-32415. See GHSA-5w6v-399v-w3cc for more information.
v1.18.7 / 2025-03-31
Dependencies
- [CRuby] Vendored libxml2 is updated to v2.13.7, which is a bugfix release.
v1.18.6 / 2025-03-24
Fixed
- [JRuby] In HTML documents,
Node#attributenow returns the correct attribute. This has been broken, and returningnil, since v1.17.0. (#3487)@flavorjonesv1.18.5 / 2025-03-19
Fixed
- [JRuby] Update JRuby's XML serialization so it outputs namespaces exactly like CRuby. (#3455, #3456)
@johnnyshieldsv1.18.4 / 2025-03-14
Security
- [CRuby] Vendored libxslt is updated to v1.1.43 to address CVE-2025-24855 and CVE-2024-55549. See GHSA-mrxw-mxhj-p664 for more information.
v1.18.3 / 2025-02-18
Security
- [CRuby] Vendored libxml2 is updated v2.13.6 to address CVE-2025-24928 and CVE-2024-56171. See GHSA-vvfq-8hwr-qm4m for more information.
v1.18.2 / 2024-01-19
... (truncated)
Commits
1dcd8ceversion bump to v1.18.9a05d2b4Apply upstream patches to address multiple vulnerabilities (#3526)947a55eApply upstream patches to address multiple vulnerabilities9187f4aversion bump to v1.18.81deea04dep: libxml2 to v2.13.8 (branchv1.18.x) (#3509)6457fe6dep: libxml2 to v2.13.813e8aa4version bump to v1.18.7605699ddep: bump libxml2 to 2.13.7 (v1.18.x backport) (#3495)804e590dep: bump libxml2 to 2.13.752bf15bdep(dev): drop Rubocop from JRuby deps- Additional commits viewable in compare view
Updates globalid from 0.4.1 to 1.0.1
Release notes
Sourced from globalid's releases.
v1.0.1
Possible ReDoS based DoS vulnerability in GlobalID
There is a ReDoS based DoS vulnerability in the GlobalID gem. This vulnerability has been assigned the CVE identifier CVE-2023-22799.
Versions Affected: >= 0.2.1 Not affected: NOTAFFECTED Fixed Versions: 1.0.1
Impact
There is a possible DoS vulnerability in the model name parsing section of the GlobalID gem. Carefully crafted input can cause the regular expression engine to take an unexpected amount of time. All users running an affected release should either upgrade or use one of the workarounds immediately.
Releases
The FIXED releases are available at the normal locations.
Workarounds
There are no feasible workarounds for this issue.
Credits
Thank you ooooooo_k for reporting this!
1.0.0
Stable API release.
The code is the same as the 0.6.0 release.
0.6.0
- Add
ActiveRecord::FixtureSet.signed_global_idhelper to generate signed ids inside fixtures.v0.5.2
- Add back Ruby 2.5 support so
gem install railsworks out of the box, thereby satisfying Rails' Ruby version requirement. See rails/rails#42931v0.5.1
- New: Allow expiration to be turned off globally rails/globalid#128
- Fixed: Support for ruby-head rails/globalid#132
- Maintainance: Drop support for EOL'ed Rubies (< 2.6.0) and Rails 4.2
v0.4.2
- Allow configuration in initialisers https://github.com/rails/globalid/commit/3c8f9090f49706769b7d4a07f9c50239e1cfbb01
... (truncated)
Commits
574b99fBump version for release4a75ecbFix ReDoS vulnerability in name parsing42f5ea6Prepare for 1.0.0beab3e4Prepare to 0.6.029e12cbUpgrade all development gemsc894a43Add devcontainer to allow contributors to have a working environmentb3ec8b9Move ActiveRecord::FixtureSet.signed_global_id to this geme9d6ed9Merge pull request #137 from rails/dependabot/bundler/nokogiri-1.12.5a565d31Bump nokogiri from 1.11.7 to 1.12.59b1a4d2Why u no love me?- Additional commits viewable in compare view
Updates loofah from 2.1.1 to 2.24.1
Release notes
Sourced from loofah's releases.
2.24.1 / 2025-05-12
Ruby support
- Import only what's needed from
cgifor support for Ruby 3.5 #296@Earlopain2.24.0 / 2024-12-24
Added
- Built-in scrubber
:double_breakpointwhich sees<br><br>and wraps the surrounding content in<p>tags. #279, #284@josecolella@torihuangImproved
- Built-in scrubber
:targetblanknow skipsatags whosehrefattribute is an anchor link. Previously, allatags were modified to havetarget='_blank'. #291@fnandoNew Contributors
@andrewmade their first contribution in flavorjones/loofah#289@fnandomade their first contribution in flavorjones/loofah#291@josecolellaand@torihuangmade their first contribution in flavorjones/loofah#284Full Changelog: https://github.com/flavorjones/loofah/compare/v2.23.1...v2.24.0
2.23.1 / 2024-10-25
Added
- Allow CSS properties
min-heightandmax-height. #288@lazyatomFull Changelog: https://github.com/flavorjones/loofah/compare/v2.23.0...v2.23.1
2.23.0 / 2024-10-24
Added
- Allow CSS property
min-width. #287@lazyatomNew Contributors
@m-nakamura145made their first contribution in flavorjones/loofah#280@lazyatommade their first contribution in flavorjones/loofah#287Full Changelog: https://github.com/flavorjones/loofah/compare/v2.22.0...v2.23.0
2.22.0 / 2023-11-13
Added
- A
:targetblankHTML scrubber which ensures all hyperlinks havetarget="_blank". #275@stefannibrasiland@thdaraujo- A
:noreferrerHTML scrubber which ensures all hyperlinks haverel=noreferrer, similar to the:nofollowand:noopenerscrubbers. #277@wynksaiddestroy
... (truncated)
Changelog
Sourced from loofah's changelog.
2.24.1 / 2025-05-12
Ruby support
- Import only what's needed from
cgifor support for Ruby 3.5 #296@Earlopain2.24.0 / 2024-12-24
Added
- Built-in scrubber
:double_breakpointwhich sees<br><br>and wraps the surrounding content in<p>tags. #279, #284@josecolella@torihuangImproved
- Built-in scrubber
:targetblanknow skipsatags whosehrefattribute is an anchor link. Previously, allatags were modified to havetarget='_blank'. #291@fnando2.23.1 / 2024-10-25
Added
- Allow CSS properties
min-heightandmax-height. #288@lazyatom2.23.0 / 2024-10-24
Added
- Allow CSS property
min-width. #287@lazyatom2.22.0 / 2023-11-13
Added
- A
:targetblankHTML scrubber which ensures all hyperlinks havetarget="_blank". #275@stefannibrasiland@thdaraujo- A
:noreferrerHTML scrubber which ensures all hyperlinks haverel=noreferrer, similar to the:nofollowand:noopenerscrubbers. #277@wynksaiddestroy2.21.4 / 2023-10-10
Fixed
Loofah::HTML5::Scrub.scrub_cssis more consistent in preserving whitespace (and lack of whitespace) in CSS property values. In particular,.scrub_cssno longer inserts whitespace between tokens that did not already have whitespace between them. [#273, fixes #271]2.21.3 / 2023-05-15
Fixed
... (truncated)
Commits
6cadc8aversion bump to v2.24.16970d9bMerge pull request #297 from flavorjones/flavorjones/ci-matrix-202505e906a74ci: add jruby 10 and jruby head, bump ruby versions for jobs4f3f606Merge pull request #296 from Earlopain/cgi-ruby-3.57094f04Only load what is required fromcgi8599060version bump to v2.24.02abdafcMerge pull request #284 from josecolella/jc-th-add-breakpoint-scrubber4d94183Drop newlines from the double-breakpoint test4b339a5docs: Update documentation9da4c19feat: Add implementation for method- Additional commits viewable in compare view
Updates rack from 2.2.2 to 2.2.19
Release notes
Sourced from rack's releases.
v2.2.8.1
What's Changed
- Fixed ReDoS in Accept header parsing [CVE-2024-26146]
- Fixed ReDoS in Content Type header parsing [CVE-2024-25126]
- Reject Range headers which are too large [CVE-2024-26141]
Full Changelog: https://github.com/rack/rack/compare/v2.2.8...v2.2.8.1
v2.2.8
What's Changed
- Limit file extension length of multipart tempfiles (2.2 backport) by
@dentargin rack/rack#2075- CHANGELOG: Add missing 2.2.7 by
@tisbain rack/rack#2081- Update cookie.rb by
@dchandekstarkin rack/rack#2092- Prefer ubuntu-latest for testing. by
@ioquatixin rack/rack#2095- Fix inefficient assert pattern in Rack::Lint [2-2-stable] by
@skipkayhilin rack/rack#2101- Regenerate SPEC [2-2-stable] by
@skipkayhilin rack/rack#2102New Contributors
@tisbamade their first contribution in rack/rack#2081@dchandekstarkmade their first contribution in rack/rack#2092Full Changelog: https://github.com/rack/rack/compare/v2.2.7...v2.2.8
v2.2.7
What's Changed
- Correct the year number in the changelog by
@kimulabin rack/rack#2015- Support underscore in host names for Rack 2.2 (Fixes #2070) by
@jeremyevansin rack/rack#2071New Contributors
@kimulabmade their first contribution in rack/rack#2015Full Changelog: https://github.com/rack/rack/compare/v2.2.6.4...v2.2.7
v2.2.6.4
No release notes provided.
Changelog
Sourced from rack's changelog.
[2.2.19] - 2025-10-07
Security
- CVE-2025-61772 Multipart parser buffers unbounded per-part headers, enabling DoS (memory exhaustion)
- CVE-2025-61771 Multipart parser buffers large non‑file fields entirely in memory, enabling DoS (memory exhaustion)
- CVE-2025-61770 Unbounded multipart preamble buffering enables DoS (memory exhaustion)
[2.2.18] - 2025-09-25
Security
- CVE-2025-59830 Unbounded parameter parsing in
Rack::QueryParsercan lead to memory exhaustion via semicolon-separated parameters.[2.2.17] - 2025-06-03
- Backport
Rack::MediaType#paramsnow handles parameters without values. (#2263,@AllyMarthaJ)[2.2.16] - 2025-05-22
- Fix incorrect backport of optional
CGI::Cookiesupport. (#2335, [@jeremyevans])[2.2.15] - 2025-05-18
- Optional support for
CGI::Cookieif not available. (#2327, #2333, [@earlopain])[2.2.14] - 2025-05-06
:warning: This release includes a security fix that may cause certain routes in previously working applications to fail if query parameters exceed 4,096 in count or 4 MB in total size. See https://github.com/rack/rack/discussions/2356 for more details.
Security
- CVE-2025-46727 Unbounded parameter parsing in
Rack::QueryParsercan lead to memory exhaustion.[2.2.13] - 2025-03-11
Security
- CVE-2025-27610 Local file inclusion in
Rack::Static.[2.2.12] - 2025-03-04
Security
- CVE-2025-27111 Possible Log Injection in
Rack::Sendfile.[2.2.11] - 2025-02-12
Security
... (truncated)
Commits
4c4ea29Bump patch version.c370dcdLimit amount of retained data when parsing multipart requestsd869fedFix denial of service vulnerbilties in multipart parsing0f76d43Bump patch version.493a411Fix thin integration.54e4ffdUnbounded parameter parsing inRack::QueryParser.9163ac3Bump patch version.8e52d2aBackport #2263 to v2.2, fix: malformed charset param (#2338)2a32ecaBump patch version.034a13cChange CGI::Cookie.new to Cookie.new (#2335)- Additional commits viewable in compare view
Updates rails-html-sanitizer from 1.0.3 to 1.6.2
Release notes
Sourced from rails-html-sanitizer's releases.
v1.6.2 / 2024-12-12
PermitScrubberfully supports frozen "allowed tags".v1.6.1 introduced safety checks that may remove unsafe tags from the allowed list, which introduced a regression for applications passing a frozen array of allowed tags. Tags and attributes are now properly copied when they are passed to the scrubber.
Fixes #195.
Mike Dalessio
1.6.1 / 2024-12-02
This is a performance and security release which addresses several possible XSS vulnerabilities.
The dependency on Nokogiri is updated to v1.15.7 or >=1.16.8.
This change addresses CVE-2024-53985 (https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-w8gc-x259-rc7x).
Mike Dalessio
Disallowed tags will be pruned when they appear in foreign content (i.e. SVG or MathML content), regardless of the
prune:option value. Previously, disallowed tags were "stripped" unless the gem was configured with theprune: trueoption.The CVEs addressed by this change are:
- CVE-2024-53986 (https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-638j-pmjw-jq48)
- CVE-2024-53987 (https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-2x5m-9ch4-qgrr)
Mike Dalessio
The tags "noscript", "mglyph", and "malignmark" will not be allowed, even if explicitly added to the allowlist. If applications try to allow any of these tags, a warning is emitted and the tags are removed from the allow-list.
The CVEs addressed by this change are:
- CVE-2024-53988 (https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-cfjx-w229-hgx5)
- CVE-2024-53989 (https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-rxv5-gxqc-xx8g)
Please note that we may restore support for allowing "noscript" in a future release. We do not expect to ever allow "mglyph" or "malignmark", though, especially since browser support is minimal for these tags.
Mike Dalessio
... (truncated)
Changelog
Sourced from rails-html-sanitizer's changelog.
v1.6.2 / 2024-12-12
PermitScrubberfully supports frozen "allowed tags".v1.6.1 introduced safety checks that may remove unsafe tags from the allowed list, which introduced a regression for applications passing a frozen array of allowed tags. Tags and attributes are now properly copied when they are passed to the scrubber.
Fixes #195.
Mike Dalessio
1.6.1 / 2024-12-02
This is a performance and security release which addresses several possible XSS vulnerabilities.
The dependency on Nokogiri is updated to v1.15.7 or >=1.16.8.
This change addresses CVE-2024-53985 (GHSA-w8gc-x259-rc7x).
Mike Dalessio
Disallowed tags will be pruned when they appear in foreign content (i.e. SVG or MathML content), regardless of the
prune:option value. Previously, disallowed tags were "stripped" unless the gem was configured with theprune: trueoption.The CVEs addressed by this change are:
- CVE-2024-53986 (GHSA-638j-pmjw-jq48)
- CVE-2024-53987 (GHSA-2x5m-9ch4-qgrr)
Mike Dalessio
The tags "noscript", "mglyph", and "malignmark" will not be allowed, even if explicitly added to the allowlist. If applications try to allow any of these tags, a warning is emitted and the tags are removed from the allow-list.
The CVEs addressed by this change are:
- CVE-2024-53988 (GHSA-cfjx-w229-hgx5)
- CVE-2024-53989 (GHSA-rxv5-gxqc-xx8g)
Please note that we may restore support for allowing "noscript" in a future release. We do not expect to ever allow "mglyph" or "malignmark", though, especially since browser support is minimal for these tags.
Mike Dalessio
Improve performance by eliminating needless operations on attributes that are being removed. #188
... (truncated)
Commits
9160d49version bump to v1.6.25843d4dfix: PermitScrubber accepts frozen tags5e96b19version bump to v1.6.1383cc7cdoc: update CHANGELOG with assigned CVEsa7b0cfeCombine the noscript/mglyph prevention blocks5658335Merge branch 'h1-2509647-noscript' into flavorjones-2024-security-fixes65fb72fMerge branch 'h1-2519936-mglyph-foster-parenting' into flavorjones-2024-secur...3fe22a8Merge branch 'h1-2519936-foreign-ns-confusion' into flavorjones-2024-security...d7a94c1Merge branch 'h1-2503220-nokogiri-serialization' into flavorjones-2024-securi...3fd6e65doc: update CHANGELOG- Additional commits viewable in compare view
Updates request_store from 1.3.2 to 1.4.0
Commits
6a0f3c9Bump to 1.4.044e2c6aclean up readme formatting28c000afix travis by forgetting about rbx2a2e081fMerge pull request #52 from aasmith/master9fd2fccMerge pull request #54 from madebylotus/feature/update-readme-with-info-on-si...9ba87b8Adds mention of using RequestStore with Sidekiq0fa2c76Support Ruby 1.8.05dd59dEnsure the request store is active during a streamed response.1103250Clear the request store on teardown between tests.- See full diff in compare view
Updates tzinfo from 1.2.4 to 1.2.11
Release notes
Sourced from tzinfo's releases.
v1.2.11
- Eliminate
Object#untaintdeprecation warnings on JRuby 9.4.0.0. #145.TZInfo v1.2.11 on RubyGems.org
v1.2.10
- Fixed a relative path traversal bug that could cause arbitrary files to be loaded with require when used with
RubyDataSource. Please refer to https://github.com/tzinfo/tzinfo/security/advisories/GHSA-5cm2-9h8c-rvfx for details. CVE-2022-31163.- Ignore the SECURITY file from Arch Linux's tzdata package. #134.
TZInfo v1.2.10 on RubyGems.org
v1.2.9
- Fixed an incorrect
InvalidTimezoneIdentifierexception raised when loading a zoneinfo file that includes rules specifying an additional transition to the final defined offset (for example, Africa/Casablanca in version 2018e of the Time Zone Database). #123.v1.2.8
- Added support for handling "slim" format zoneinfo files that are produced by default by zic version 2020b and later. The POSIX-style TZ string is now used calculate DST transition times after the final defined transition in the file. The 64-bit section is now always used regardless of whether Time has support for 64-bit times. #120.
- Rubinius is no longer supported.
v1.2.7
- Fixed 'wrong number of arguments' errors when running on JRuby 9.0. #114.
- Fixed warnings when running on Ruby 2.8. #112.
v1.2.6
Timezone#strftime('%s', time)will now return the correct number of seconds since the epoch. #91.- Removed the unused
TZInfo::RubyDataSource::REQUIRE_PATHconstant.- Fixed "SecurityError: Insecure operation - require" exceptions when loading data with recent Ruby releases in safe mode.
- Fixed warnings when running on Ruby 2.7. #106 and #111.
v1.2.5
- Support recursively (deep) freezing
CountryandTimezoneinstances. #80.- Allow negative daylight savings time offsets to be derived when reading from zoneinfo files. The utc_offset and std_offset are now derived correctly for Europe/Dublin in the 2018a and 2018b releases of the Time Zone Database.
Changelog
Sourced from tzinfo's changelog.
Version 1.2.11 - 28-Jan-2023
- Eliminate
Object#untaintdeprecation warnings on JRuby 9.4.0.0. #145.Version 1.2.10 - 19-Jul-2022
- Fixed a relative path traversal bug that could cause arbitrary files to be loaded with
requirewhen used withRubyDataSource. Please refer to https://github.com/tzinfo/tzinfo/security/advisories/GHSA-5cm2-9h8c-rvfx for details. CVE-2022-31163.- Ignore the SECURITY file from Arch Linux's tzdata package. #134.
Version 1.2.9 - 16-Dec-2020
- Fixed an incorrect
InvalidTimezoneIdentifierexception raised when loading a zoneinfo file that includes rules specifying an additional transition to the final defined offset (for example, Africa/Casablanca in version 2018e of the Time Zone Database). #123.Version 1.2.8 - 8-Nov-2020
- Added support for handling "slim" format zoneinfo files that are produced by default by zic version 2020b and later. The POSIX-style TZ string is now used calculate DST transition times after the final defined transition in the file. The 64-bit section is now always used regardless of whether Time has support for 64-bit times. #120.
- Rubinius is no longer supported.
Version 1.2.7 - 2-Apr-2020
- Fixed 'wrong number of arguments' errors when running on JRuby 9.0. #114.
- Fixed warnings when running on Ruby 2.8. #112.
Version 1.2.6 - 24-Dec-2019
Timezone#strftime('%s', time)will now return the correct number of seconds since the epoch. #91.- Removed the unused
TZInfo::RubyDataSource::REQUIRE_PATHconstant.- Fixed "SecurityError: Insecure operation - require" exceptions when loading data with recent Ruby releases in safe mode.
- Fixed warnings when running on Ruby 2.7. #106 and #111.
Version 1.2.5 - 4-Feb-2018
... (truncated)
Commits
2dc46fdPreparing v1.2.11.c854e6aUpdate copyright years.9c092f3Eliminate Object#untaint deprecation warnings on JRuby 9.4.0.0.4e5f8b7Add Ruby 3.1, 3.2 and JRuby 9.4.2f58c69Update the dependency on actions/checkout.e52c056Revert "Workaround for 'Permission denied - NUL' errors with JRuby on Windows."0814dcdFix the release date.fd05e2aPreparing v1.2.10.b98c32eMerge branch 'fix-directory-traversal-1.2' into 1.2ac3ee68Remove unnecessary escaping of + within regex character classes.- Additional commits viewable in compare view
Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.
Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
-
@dependabot rebasewill rebase this PR -
@dependabot recreatewill recreate this PR, overwriting any edits that have been made to it -
@dependabot mergewill merge this PR after your CI passes on it -
@dependabot squash and mergewill squash and merge this PR after your CI passes on it -
@dependabot cancel mergewill cancel a previously requested merge and block automerging -
@dependabot reopenwill reopen this PR if it is closed -
@dependabot closewill close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually -
@dependabot show <dependency name> ignore conditionswill show all of the ignore conditions of the specified dependency -
@dependabot ignore <dependency name> major versionwill close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself) -
@dependabot ignore <dependency name> minor versionwill close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself) -
@dependabot ignore <dependency name>will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself) -
@dependabot unignore <dependency name>will remove all of the ignore conditions of the specified dependency -
@dependabot unignore <dependency name> <ignore condition>will remove the ignore condition of the specified dependency and ignore conditions You can disable automated security fix PRs for this repo from the Security Alerts page.